Search results

1 – 10 of over 24000
Book part
Publication date: 25 November 2019

Helen Forbes-Mewett and Kien Nguyen-Trung

Since the late 1980s, social theorists championed for the birth of a new era, in which societies were increasingly exposed to growing global risks. The presence of increasing risks

Abstract

Since the late 1980s, social theorists championed for the birth of a new era, in which societies were increasingly exposed to growing global risks. The presence of increasing risks including natural disasters, technological errors, terrorist attacks, nuclear wars and environmental degradation suggests that human beings are becoming increasingly vulnerable. Therefore, an understanding of vulnerability is crucial. Vulnerability is often considered as the potential to suffer from physical attacks. This approach, however, has limited capacity to explain many forms of suffering including not only physical aspects, but also mental, social, economic, political and social dimensions. This chapter draws on the vulnerability literature to present an overarching framework for the book. It starts with an outline of the concept origins, then discusses its relationship with the risk society thesis before forming conceptualisation. The chapter then points out the key similarities and differences between vulnerability and other concepts such as risk, disaster, poverty, security and resilience. The authors rework an existing “security” framework to develop a new definition of the concept of vulnerability. Finally, the authors look into the root causes and the formation of vulnerability within social systems.

Details

Vulnerability in a Mobile World
Type: Book
ISBN: 978-1-78756-912-6

Keywords

Article
Publication date: 3 January 2023

Pengcheng Xiang, Xin Xia and Xianya Pang

The purpose of this paper is to develop a novel integrated risk assessment method from the system perspective to evaluate the risk of the cross-regional mega construction project…

Abstract

Purpose

The purpose of this paper is to develop a novel integrated risk assessment method from the system perspective to evaluate the risk of the cross-regional mega construction project (CMCP). Furthermore, this paper aims to confirm the core risk source factors and refine the risk management strategies of CMCPs through a case study.

Design/methodology/approach

Based on the analysis of the risk system of CMCPs, the concept model and risk assessment principles of integrated risk assessment were confirmed. The risk source factors and project objectives of the CMCP were identified from a literature review, export interview and case analysis. According to the vulnerability theory, the integrated risk assessment model was developed by involving vulnerabilities, threats, objectives and interaction of those factors synthetically. Then, ZW high-speed railway from China was analyzed to verify the feasibility and effectiveness of the proposed method.

Findings

As a result, 12 threat factors and 12 vulnerability factors were identified. Based on the case study, the main external threat comes from T13 (conflicts of interest between local governments) and T23 (harsh natural environment); the most easily exploited internal vulnerabilities were V11 (complexity of technology), V13 (lack of experience in technical application), V21 (inadequate experience) and V23 (lack of interest coordination mechanism). Moreover, the economic objective was most affected.

Practical implications

It is essential to develop an interest coordination mechanism for CMCPs. The harsh natural environment is a critical factor, but it also promotes technological innovation and iteration. Public opinions in different regions are critical for CMCPs, and more emphasis should be placed on public opinion surveys of CMCPs. Moreover, diverse and flexible environmental protection strategies should apply in CMCPs.

Originality/value

This research has the following three contributions. First, based on vulnerability theory, an integrated risk assessment approach of CMCPs is developed, which enriches the risk measurement method system and provides inspiration for future research on risk in the construction industry. Second, the risk sources of CMCPs are identified from the perspective of vulnerability and threat to provide clear guidance for the risk management of CMCPs. Third, the core risk source factors and management strategies confirmed by the case study will be beneficial for various governments in different regions and project managers to optimize the project management scheme, as they are transferable management experiences.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 2 November 2012

Sining Cuevas

This paper aims to illustrate how the climate change‐vulnerabilityrisk model (CCVRM) can be used to analyze the changes in system vulnerabilities and risks, as a result of…

Abstract

Purpose

This paper aims to illustrate how the climate change‐vulnerabilityrisk model (CCVRM) can be used to analyze the changes in system vulnerabilities and risks, as a result of implementing a community‐based early warning system (EWS).

Design/methodology/approach

The CCVRM is used to examine the community‐based EWS being implemented in the municipalities of Infanta and General Nakar in Quezon Province, Philippines. The levels of vulnerabilities and risks of the two localities are assessed through qualitative analysis using the CCVRM as framework. The model is also used to analyze the effects of the EWS in addressing the localities' vulnerabilities and risks.

Findings

Technological and institutional vulnerabilities of the Infanta and General Nakar systems have lessened when the EWS project was implemented. Technological and institutional vulnerabilities have direct correlations with mortality risk; thus, when the levels of the former decrease, so does the latter. Although the reduced technological and institutional vulnerabilities have an effect on the other type of risks present in the municipalities, the effects were not as significant as that of with mortality risk.

Research limitations/implications

Due to limited time and resources, only one adaptation program is analyzed, specifically, the community‐based EWS being implemented in the municipalities of Infanta and General Nakar, Philippines. An integrated analysis of different measures is not done. Although investigating a multi‐adaptation program is possible, this would require more time and resources to implement. Likewise, only a simple evaluation based on model definitions is conducted, instead of a more extensive risk and vulnerability assessment.

Originality/value

The CCVRM acts as an analytical guide in understanding the effects of climate change adaptive measures. Accordingly, this paper investigates the effects of an implemented adaptive measure. The study also shows how the CCVRM can be used to analyze planned measures and identify the types of risks and vulnerabilities that this type of adaptive measure can influence.

Details

International Journal of Climate Change Strategies and Management, vol. 4 no. 4
Type: Research Article
ISSN: 1756-8692

Keywords

Article
Publication date: 29 July 2014

Haitham Bashier Abbas and Jayant K. Routray

The purpose of this paper is to analyze flood vulnerability vis-à-vis flood-induced health risks, and understand the relationship between them to suggest measures to reduce health…

1184

Abstract

Purpose

The purpose of this paper is to analyze flood vulnerability vis-à-vis flood-induced health risks, and understand the relationship between them to suggest measures to reduce health risks in Sudan.

Design/methodology/approach

This study compares the vulnerability to flood and health consequences in two communities in Aroma. This study compares the vulnerability of Aroma semi-urban vicinity and Tendellei rural village, in Sudan, to flood and health consequences. A set of socioeconomic and health indicators were studied in 251 households. Households were classified according to their calculated vulnerability composite index. The index was validated through comparing the vulnerability values with the level of impact in each household.

Findings

About 30 percent of households are highly/very highly vulnerable to flood risk. On the other hand, 41 percent of the rural households and 25 percent of the semi-urban houses are highly/very highly vulnerable to health risks. The main determinants of flood vulnerability are; the number of earning family members, level of education and economic activity of the household's head. The rural households are found to be more vulnerable to health risks while semi-urban households are more vulnerable to flooding. Flood and health vulnerabilities are positively correlated. Factors like urbanization, poverty and education directly affect the vulnerability of communities.

Research limitations/implications

The methodology could be strengthened through the running of multi-various regression to relate selected vulnerability indicators to incidence of malaria and diarrhea in each household.

Practical implications

The method described in this paper is flexible; applicable and can be reproduced for other areas and risks.

Social implications

Vulnerability determinants affect the two communities differently and this necessitates specific consideration when developing policy. The policy should tackle the root causes of vulnerability to cut the vicious circle of poverty, illiteracy and illness. Those root causes should be managed by integrating multi-hazard approaches for effective and efficient interventions.

Originality/value

The method described in this paper is original, flexible; applicable and can be reproduced for other areas and risks.

Details

Disaster Prevention and Management, vol. 23 no. 4
Type: Research Article
ISSN: 0965-3562

Keywords

Article
Publication date: 18 February 2021

Rafael Renteria, Mario Chong, Irineu de Brito Junior, Ana Luna and Renato Quiliche

This paper aims to design a vulnerability assessment model considering the multidimensional and systematic approach to disaster risk and vulnerability. This model serves to both…

Abstract

Purpose

This paper aims to design a vulnerability assessment model considering the multidimensional and systematic approach to disaster risk and vulnerability. This model serves to both risk mitigation and disaster preparedness phases of humanitarian logistics.

Design/methodology/approach

A survey of 27,218 households in Pueblo Rico and Dosquebradas was conducted to obtain information about disaster risk for landslides, floods and collapses. We adopted a cross entropy-based approach for the measure of disaster vulnerability (Kullback–Leibler divergence), and a maximum-entropy estimation for the reconstruction of risk a priori categorization (logistic regression). The capabilities approach of Sen supported theoretically our multidimensional assessment of disaster vulnerability.

Findings

Disaster vulnerability is shaped by economic, such as physical attributes of households, and health indicators, which are in specific morbidity indicators that seem to affect vulnerability outputs. Vulnerability is heterogeneous between communities/districts according to formal comparisons of Kullback–Leibler divergence. Nor social dimension, neither chronic illness indicators seem to shape vulnerability, at least for Pueblo Rico and Dosquebradas.

Research limitations/implications

The results need a qualitative or case study validation at the community/district level.

Practical implications

We discuss how risk mitigation policies and disaster preparedness strategies can be driven by empirical results. For example, the type of stock to preposition can vary according to the disaster or the kind of alternative policies that can be formulated on the basis of the strong relationship between morbidity and disaster risk.

Originality/value

Entropy-based metrics are not widely used in humanitarian logistics literature, as well as empirical data-driven techniques.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 11 no. 3
Type: Research Article
ISSN: 2042-6747

Keywords

Article
Publication date: 9 January 2017

Rofyanto Kurniawan, Suhaiza Hanim Zailani, Mohammad Iranmanesh and Premkumar Rajagopal

The vulnerability issue in supply chains is among the most pressing concerns that firms are currently facing. As a preliminary attempt to address the lack of empirical research…

4203

Abstract

Purpose

The vulnerability issue in supply chains is among the most pressing concerns that firms are currently facing. As a preliminary attempt to address the lack of empirical research, this paper aims to primarily explore the relationship between vulnerability mitigation strategies and supply chain effectiveness with security culture as a moderator.

Design/methodology/approach

Data are gathered via a survey of 209 Indonesian manufacturing firms. The data are analyzed using partial least squares technique.

Findings

Results indicate that supply chain visibility, supply chain flexibility and supplier development strategies positively affect supply chain effectiveness. Moreover, risk culture positively moderates the effects of supply chain visibility and supplier development on supply chain effectiveness.

Practical implications

The findings may improve supply chain effectiveness by mitigating the effects of vulnerability causes.

Originality/value

This study contributes to the advancement of knowledge on the relationships between vulnerability mitigation strategies and supply chain effectiveness.

Details

Supply Chain Management: An International Journal, vol. 22 no. 1
Type: Research Article
ISSN: 1359-8546

Keywords

Article
Publication date: 12 July 2013

Stefan Taubenberger, Jan Jürjens, Yijun Yu and Bashar Nuseibeh

In any information security risk assessment, vulnerabilities are usually identified by information‐gathering techniques. However, vulnerability identification errors – wrongly…

1004

Abstract

Purpose

In any information security risk assessment, vulnerabilities are usually identified by information‐gathering techniques. However, vulnerability identification errors – wrongly identified or unidentified vulnerabilities – can occur as uncertain data are used. Furthermore, businesses' security needs are not considered sufficiently. Hence, security functions may not protect business assets sufficiently and cost‐effectively. This paper aims to resolve vulnerability errors by analysing the security requirements of information assets in business process models.

Design/methodology/approach

Business process models have been selected for use, because there is a close relationship between business process objectives and risks. Security functions are evaluated in terms of the information flow of business processes regarding their security requirements. The claim that vulnerability errors can be resolved was validated by comparing the results of a current risk assessment approach with the proposed approach. The comparison is conducted both at three entities of an insurance company, as well as through a controlled experiment within a survey among security professionals.

Findings

Vulnerability identification errors can be resolved by explicitly evaluating security requirements in the course of business; this is not considered in current assessment methods.

Originality/value

It is shown that vulnerability identification errors occur in practice. With the explicit evaluation of security requirements, identification errors can be resolved. Risk assessment methods should consider the explicit evaluation of security requirements.

Details

Information Management & Computer Security, vol. 21 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 March 2011

Sining C. Cuevas

This research aims to develop a model that may be used to determine the effective adaptive measures to implement in a system affected by climate change.

2736

Abstract

Purpose

This research aims to develop a model that may be used to determine the effective adaptive measures to implement in a system affected by climate change.

Design/methodology/approach

The three primary dimensions of the model were individually investigated and then the linkages among them were developed. Specifically, the nature of climate change was examined and the issues emerging from the changes were analyzed. Next, an intensive study of system vulnerabilities was conducted, and the third factor in the model, risk, is then explored. Afterwards, the conceptual framework, which is the foundation of the climate change vulnerability risk model, was devised and the model created.

Findings

The model is a three‐dimensional matrix with the nature of climate change, vulnerabilities, and risks as its chief dimensions. It identifies the four natures of climate change, namely: variability, intensity, frequency, and quantity and the vulnerability types to be socio‐economic, biophysical, technological, and institutional. Meanwhile, risks are classified as income, biodiversity, health, mortality, and infrastructure risks.

Research limitations/implications

The research is the first phase of a three‐stage study on the linkages among climate change, vulnerability, and risks. It is the development stage of the framework that exemplifies the interrelationships among these variables and is the basis of the statistical and econometric analyses in the later stages.

Originality/value

The climate change vulnerability risk model was developed to act as an analytical guide in understanding the effects of climate change to systems. The model may be used to determine the effective adaptive measures to apply in the system, through a comparative analysis of the variables in the matrix.

Details

International Journal of Climate Change Strategies and Management, vol. 3 no. 1
Type: Research Article
ISSN: 1756-8692

Keywords

Book part
Publication date: 25 September 2012

Patricia Romero-Lankao, Hua Qin, Sara Hughes, Melissa Haeffner and Mercy Borbor-Cordova

Purpose – The vulnerability and adaptive capacities of cities in Latin America have received relatively less attention compared to other regions of the world. This chapter seeks…

Abstract

Purpose – The vulnerability and adaptive capacities of cities in Latin America have received relatively less attention compared to other regions of the world. This chapter seeks to address these gaps by (a) examining vulnerability to the health impacts from air pollution and temperature, and exploring whether socioeconomic factors between neighborhoods differentiate these risks within the cities of Bogota, Buenos Aires, Mexico City, and Santiago and (b) assessing the capacity of urban populations to perceive and respond to vulnerability and risk.

Design/methodology/approach – Because of the complex nature of vulnerability, we combined a set of quantitative and quantitative methods and data to determine whether and under what conditions the people in these cities are vulnerable (e.g., Time Series Analysis, Generalized Linear Model, and statistical correlations of exposure and human mortality with socioeconomic vulnerability).

Findings – We found high levels of PM10, ozone, and other criteria air pollutants in three cities for which we had data. However, the pattern of their impacts on health depends on the particulars of pollutant levels and atmospheric and weather conditions of each city. Our results reflect the varied facets of urban vulnerability and shed light on the nature of the associated human health risks. Although wealthy populations have access to education, good quality housing, and health services to mitigate some environmental risks, overall the data show that health impacts from air pollution and temperature in the study cities do not necessarily depend on socioeconomic differentiations.

Research limitations/implications – Although we sought to use quantitative and qualitative methods, given the complexity of the research, it has proven difficult to fully explore these issues across scales and with a full accounting of local context.

Practical implications – Our findings show that wealthy and educated populations may be equally at risk to the health implications of air pollution. Policies designed to mitigate these risks should not use socioeconomic characteristics as predictors of a population's risk in relation to air pollution.

Originality/value – This research contributes valuable insights into the dynamics of vulnerability to air pollution in Latin American cities, a region that has been historically underrepresented in empirical studies of urban risk. We have also combined a range of methods and approaches to improve our understanding of the multifaceted nature of urban vulnerability to global environmental change.

Article
Publication date: 5 March 2018

Baidyanath Biswas and Arunabha Mukhopadhyay

Malicious attackers frequently breach information systems by exploiting disclosed software vulnerabilities. Knowledge of these vulnerabilities over time is essential to decide the…

Abstract

Purpose

Malicious attackers frequently breach information systems by exploiting disclosed software vulnerabilities. Knowledge of these vulnerabilities over time is essential to decide the use of software products by organisations. The purpose of this paper is to propose a novel G-RAM framework for business organisations to assess and mitigate risks arising out of software vulnerabilities.

Design/methodology/approach

The G-RAM risk assessment module uses GARCH to model vulnerability growth. Using 16-year data across 1999-2016 from the National Vulnerability Database, the authors estimate the model parameters and validate the prediction accuracy. Next, the G-RAM risk mitigation module designs optimal software portfolio using Markowitz’s mean-variance optimisation for a given IT budget and preference.

Findings

Based on an empirical analysis, this study establishes that vulnerability follows a non-linear, time-dependent, heteroskedastic growth pattern. Further, efficient software combinations are proposed that optimise correlated risk. The study also reports the empirical evidence of a shift in efficient frontier of software configurations with time.

Research limitations/implications

Existing assumption of independent and identically distributed residuals after vulnerability function fitting is incorrect. This study applies GARCH technique to measure volatility clustering and mean reversal. The risk (or volatility) represented by the instantaneous variance is dependent on the immediately previous one, as well as on the unconditional variance of the entire vulnerability growth process.

Practical implications

The volatility-based estimation of vulnerability growth is a risk assessment mechanism. Next, the portfolio analysis acts as a risk mitigation activity. Results from this study can decide patch management cycle needed for each software – individual or group patching. G-RAM also ranks them into a 2×2 risk-return matrix to ensure that the correlated risk is diversified. Finally the paper helps the business firms to decide what to purchase and what to avoid.

Originality/value

Contrary to the existing techniques which either analyse with statistical distributions or linear econometric methods, this study establishes that vulnerability growth follows a non-linear, time-dependent, heteroskedastic pattern. The paper also links software risk assessment to IT governance and strategic business objectives. To the authors’ knowledge, this is the first study in IT security to examine and forecast volatility, and further design risk-optimal software portfolios.

Details

Journal of Enterprise Information Management, vol. 31 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 10 of over 24000